scholarly journals Information technology for mobile perimeter security systems creation

2021 ◽  
Vol 1840 (1) ◽  
pp. 012022
Author(s):  
N Lobanchykova ◽  
S Kredentsar ◽  
I Pilkevych ◽  
M Medvediev
2016 ◽  
Vol 10 (2) ◽  
pp. 1
Author(s):  
Arif Nurochman

Library information systems and information assets administered to users become the backbone of library service with the support of information technology. Howevet the application of library information systems that grows rapidly may raise the riskthat causesfailures threatening librarians in assessing sources of risk threats. Risks may include events and conditions that lead to disruption in information services and the problem of the decision-making process evaluation although not documented in writing. Informants of this study consist of librarians who have social interaction with library information system. The method uses qualitative case study approach with in-depth interviews and direct observation.The results ofthe study identifies the riskin a hang of backup server is high, iThe purpose of this study is to describe the implementation of risk management in information systems at Gadjah Mada University Library using NISTSP 800-30 frame work and to determine factors that affect the implementation of risk management in information systems at the library. Risk management in information systems at Gadjah Mada University Library has been implemented to anticipate the various sources of risk threats by conducting risk assessment, risk mitigation and risk electricity is high, in security systems is high, in passwords is high, in authorization permission is moderate and in human resources is moderate. To reduce and eliminate the risk impact, Gadjah Mada University Library conducts risk mitigation by transferring the risk from a library information systemservers to PSDI (Center for Systems and Information Resources), while the risk evaluation of the activities is carried out continuously and consistently by the librarians to implement control and activities in risk mitigation to the extent acceptable to the library. Factors affectiig the implementation of risk management information systems at the Gadjah Mada University Library are influenced by the policies of the University, the perception of the library's head and human resources and technicalcapabilities in the fi eld of information technology.


2020 ◽  
pp. 1858-1873
Author(s):  
Edward T. Chen

The purpose of this article is to review the existing literature on health information technology (HIT), specifically electronic health records (EHR) and life-long patient records, in order to provide a broad assessment of the current state of this technology in the United States. Relevant literature was reviewed to determine whether key hypotheses were validated. Areas for additional research and development were identified, and a potential path forward was proposed. HIT adoption is a worthwhile effort in the United States, and it is possible for us to enact an interoperable central records system within our current fee-for-service healthcare system. Wide scale adoption will require subsidies and regulatory involvement at the state level, but professional networks may be exploited to speed the rate of adoption. A four-tier architecture with autonomic security systems, properly validated, can provide the infrastructure necessary.


2020 ◽  
Vol 12 (2) ◽  
pp. 36-37
Author(s):  
Milan Marcinek

. Intelligent transportation systems introduce smart technology to civil transportation infrastructure. Modern services depend on the use of information technology systems. Cybersecurity plays an important role in the ongoing development of information technology. Enhancing cybersecurity and protecting critical information infrastructures are essential to each national security. Nowadays, vehicles are equipped with electronic security systems that automatically call the emergency service operator in case of an accident. This safety system combines different technology in order to ensure vehicle safety. When you are unconscious, the system informs the rescuers where the accident happened. They arrive at the scene of the accident within a few minutes. The introduction of this system in vehicles results from Regulation (EU) 2015/758 of the European Parliament and of the Council of 29 April 2015 on type-approval requirements for the deployment of the 112 on-board eCall system and amending Directive 2007/46/EC. Nevertheless, there is concern that this could expose connected cars with their passengers to potential risks from online threats. Scientific development for the security of our vehicles has also raised the possibility of misuse of vehicle data. It is seen that e-threats have become the leading threats in the further deployment of e-services in the society of the 21st century.


Author(s):  
Э.Д. Алисултанова ◽  
Д.С. Бицалов

Данная статья направлена на формирование эффективной системы защиты информации. В настоящее время ввиду совершенствования информационных технологий все более актуальной становится проблема защиты информации, так как вместе с улучшением методов защиты информации, к сожалению, развиваются и методы утечки информации. В данной статье рассмотрена одна из актуальных систем защиты информации, система ViPNet Client. Программный комплекс ViPNet Client предназначен для защиты рабочих мест корпоративных пользователей. ViPNet Client надежно защищает от внешних и внутренних сетевых атак за счет фильтрации трафика. Кроме того, ПК ViPNet Client обеспечивает защищенную работу с корпоративными данными через зашифрованный канал, в том числе для удаленных пользователей. This article is aimed at the formation of an effective system of information security. Currently, in view of the improvement of information technology, the problem of information security remains more urgent, as together with the improvement of information security methods, information leakage methods are unfortunately developing. This article describes one of the current information security systems, ViPNet Client system. The ViPNet Client servage software package is designed to protect the workplaces of corporate users. ViPNet Client podaressis protects the cigar from external and internal network attacks by filtering the representation of the traffic. In addition, the ViPNet Glukharev Client PC provides secure nonadministrative work with corporate data shunning through an encrypted channel, including for remote eliminated users.


Author(s):  
Rand Mohammad Abu Hammour ◽  
Yousef Safwan Al Gharaibeh

Social Engineering Attack is recently becoming a real threat affecting organizations, whereas 53.9% of such attacks are targeting the banking sector, where the success of this kind of attacks can cause a huge financial loss, customer’s sensitive data damage and a real reputational loss, and although banks are investing their money on security, and spending budgets on securing their hardware and software, but it is the human being factor that is the weakness that can be easily exploited and is still the real security challenge, which will always keep the banking sector under the risk of a successful social engineering attack. In this paper, we applied an information technology governance framework on a certain Jordanian bank to avoid the success of a social engineering attack, and we worked on a case study that mainly focuses on Phishing Attack, which is considered one of the most common threats in banks and the way staff will deal with it. The results show positive improvements in staff awareness and in avoiding such types of attacks, as well as a marked increase in reporting any suspicious activity noticed by employees.


2020 ◽  
Vol 2 (1) ◽  
pp. 44-51
Author(s):  
Anni Sri Rahayu ◽  
Agustinus Fritz Wijaya

PT Global Infotech Solution is a service, marketing and IT consulting company, among others, data solutions, security systems, cloud and managed services. In carrying out business processes there are several factors that must be considered by the company, not only focusing on the use of information technology that supports business processes, but the company must be able to focus on maintaining, monitoring, managing and ensuring that the company complies with applicable laws and regulations so that the company is able provide publishers with business objectives. Therefore, researchers use the Monitor and Evaluate domain. The purpose of this study is to measure the level of maturity of a company's information technology based on the process of maintenance, management and the extent to which companies obey the applicable laws and regulations. The research methodology is a qualitative method, with data collection through observation and interviews with informants. The results of this study are the level of maturity the company and provide advice to companies so that the application of information technology can be better, effective and efficient.


Author(s):  
Bagus Sujiwo ◽  
Efrizon Efrizon

Progress The development of information technology (IT) is increasingly rapid both for the use of software (software) and hardware (hardware) which is increasingly easy to use (user friendly) to help learning all the users of information technology. In the world of education or everyday life everyone needs to get entertainment or reference that must be used to be a reference so that they are not bored and bored after a day of tired activities. One of them can be done by watching through the internet network television media or TV (Cable) subscription TV. This cable TV management information system is designed using a web-based prototyping method involving the PHP (PHP Hypertext Preprocessor) programming language based on the code -iter, JavaScript, Jquery framework. While the database used is MYSQL. In system design is involved Use Case, Activity Diagram, Context Diagram, Flowmap, Sequence Diagram and ERD. This system also uses aliases on its addressing by applying htaccess to the actual file address as one of the security systems. . This information system involves six admin users, customers, leaders, finance, officers and marketing. The six levels of registered users have a private account to be able to enter the system ie username and password with MD5 encryption. Because it is web-based, this cable TV application has the ability, can be accessed anywhere, admin can do add, edit, delete and store customer data and customer transaction data, and can print reports.


Jurnal Pari ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 151
Author(s):  
Nasrul Rizal Lubis

Perkembangan teknologi informasi saat ini semakin cepat berkembang. Perpustakaan digital dapat dibilang sebagai bentuk baru dalam pelayanan informasi untuk penguna perpustakaan, sehinga dalam bentuk pelayanan dapat dirambah oleh hal layak. Modus dan motif kian kompleks,dan tidak ada jaminan keamanan cyberspace, dan tidak ada sistem keamanan komputer yang mampu melindungi data yang ada yang dimiliki perpustakaan. Langkah yang baik untuk menghadapi hal tersebut adalah dengan memutakhirkan pengetahuan SDM perpustakaan digital, meng-update dan mengupgrade sistem keamanan komputer, dan kerjasama dengan dengan instansi terkait dalam menangani masalah cybercrime.The development of information technology is now growing rapidly. Digital libraries can be regarded as a new form of information services for library users, so that in the form of services can be encroached by decent things. The mode and motive are increasingly complex, and there is no guarantee of cyberspace security, and no computer security system is able to protect the existingdata the library has. A good way to deal with this is by updating the digital library’s human resource knowledge, updating and upgrading computer security systems, and cooperation with relevant agencies in handling cybercrime issues


Sign in / Sign up

Export Citation Format

Share Document